From 1a7f2beb1aef42385d234da0670eef53b3dbe6e6 Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Fri, 19 Jul 2024 09:03:54 -0700 Subject: [PATCH 1/3] [threat-actors] Add Lifting Zmiy --- clusters/threat-actor.json | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 83885f5..e682454 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -16378,6 +16378,18 @@ }, "uuid": "feeab818-a9bd-4bff-9923-bf8421abd6c5", "value": "CRYSTALRAY" + }, + { + "description": "Rostelecom's security team has discovered a new APT group that is breaching companies via industrial PLCs. Named Lifting Zmiy, the group's first attacks were traced back to October 2023. The group targeted PLCs from Russian company Tech-Automatics usually used with elevators and which were still using their default passwords. Rostelecom has linked the group to intrusions at a Russian government contractor, two telecom operators, and an IT company. The company says the group collected and exfiltrated data and then destroyed the victim's infrastructure. Rostelecom says Lifting Zmiy uses Starlink infrastructure for attacks and appears to operate out of Eastern Europe.", + "meta": { + "refs": [ + "https://www.rbc.ru/technology_and_media/08/07/2024/6687f9af9a7947780a5d1a31", + "https://tadviser.com/index.php/Company:Tecon-Automatics_NGO", + "https://news.risky.biz/risky-biz-news-us-takes-down-rts-twitter-bot-farm/" + ] + }, + "uuid": "b9968b5f-0a5a-4be6-9dd2-428244741323", + "value": "Lifting Zmiy" } ], "version": 312 From 0bf9d66d1454555c9b139ceb4e6530d848532ec2 Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Fri, 19 Jul 2024 09:03:54 -0700 Subject: [PATCH 2/3] [threat-actors] Add Nullbulge --- clusters/threat-actor.json | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index e682454..8c20c66 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -16390,6 +16390,16 @@ }, "uuid": "b9968b5f-0a5a-4be6-9dd2-428244741323", "value": "Lifting Zmiy" + }, + { + "description": "NullBulge is a cybercriminal threat group targeting AI and gaming focused entities. They weaponize code in publicly available repositories to distribute malware, including LockBit ransomware. The group claims to be motivated by a pro-art, anti-AI cause, but their activities indicate a financial focus. NullBulge uses obfuscated code in public repositories and malicious mods to target their victims.", + "meta": { + "refs": [ + "https://www.sentinelone.com/labs/nullbulge-threat-actor-masquerades-as-hacktivist-group-rebelling-against-ai/" + ] + }, + "uuid": "000d8bbf-cb6f-4f7b-89a4-9c136ac4bc5a", + "value": "Nullbulge" } ], "version": 312 From 5e83abbc9f9dca14a32932c7202449368b7fff57 Mon Sep 17 00:00:00 2001 From: Mathieu4141 Date: Fri, 19 Jul 2024 09:03:55 -0700 Subject: [PATCH 3/3] [threat actors] Update README --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index da467b6..e447f1b 100644 --- a/README.md +++ b/README.md @@ -535,7 +535,7 @@ Category: *tea-matrix* - source: ** - total: *7* elements [Threat Actor](https://www.misp-galaxy.org/threat-actor) - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. threat-actor-classification meta can be used to clarify the understanding of the threat-actor if also considered as operation, campaign or activity group. -Category: *actor* - source: *MISP Project* - total: *709* elements +Category: *actor* - source: *MISP Project* - total: *711* elements [[HTML](https://www.misp-galaxy.org/threat-actor)] - [[JSON](https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json)]